Title
Taint-enhanced anomaly detection
Abstract
Anomaly detection has been popular for a long time due to its ability to detect novel attacks. However, its practical deployment has been limited due to false positives. Taint-based techniques, on the other hand, can avoid false positives for many common exploits (e.g., code or script injection), but their applicability to a broader range of attacks (non-control data attacks, path traversals, race condition attacks, and other unknown attacks) is limited by the need for accurate policies on the use of tainted data. In this paper, we develop a new approach that combines the strengths of these approaches. Our combination is very effective, detecting attack types that have been problematic for taint-based techniques, while significantly cutting down the false positives experienced by anomaly detection. The intuitive justification for this result is that a successful attack involves unusual program behaviors that are exercised by an attacker. Anomaly detection identifies unusual behaviors, while fine-grained taint can filter out behaviors that do not seem controlled by attacker-provided data.
Year
DOI
Venue
2011
10.1007/978-3-642-25560-1_11
ICISS
Keywords
Field
DocType
anomaly detection,taint-enhanced anomaly detection,attacker-provided data,race condition attack,tainted data,false positive,attack type,novel attack,non-control data attack,successful attack,taint-based technique
Race condition,Data mining,Anomaly detection,Attack model,Software deployment,Computer science,Computer security,Exploit,System call,Intrusion detection system,False positive paradox
Conference
Volume
ISSN
Citations 
7093
0302-9743
2
PageRank 
References 
Authors
0.36
26
2
Name
Order
Citations
PageRank
Lorenzo Cavallaro188652.85
R. C. Sekar22328168.76